2022S2 Week5 Security R1a
2022S2 Week5 Security R1a
7 1
Example: did the response to coronavirus cause more damage
and loss than the virus itself, if it were left “unsecured”?
To a great extent, what you believe will determine whether, and
how to secure something.
6 The Threat Landscape
7 Why Computer Incidents Are So Prevalent
Increasing Complexity Increases Vulnerability
Cloud computing, networks, computers, mobile devices,
virtualization, OS applications, Web sites, switches, routers, and
gateways are interconnected and driven by millions of lines of
code
Higher Computer User Expectations
Computer help desks are under intense pressure to respond very
quickly to users’ questions
Expanding and Changing Systems Introduce New Risks
It is difficult for IT organizations to keep up with the pace of
technological change, successfully perform an ongoing
assessment of new security risks, and implement approaches for
dealing with them
12 Types of Exploits
13 Types of Exploits
Common attacks include:
Ransomware
Viruses
Worms
Trojan horses
Blended threat
Spam
Distributed denial-of-service attacks
Rootkits
Advanced persistent threat
Phishing, spear-phishing, smishing and vishing
Identity theft
Cyberespionage and cyberterrorism
14
Identity theft
Cyberespionage and cyberterrorism
14 Types of Exploits
Ransomware
Malware that stops you from using your computer or accessing
your data until you meet certain demands such as paying a
ransom or sending photos to the attacker
Viruses
A piece of programming code (usually disguised as something
else) that causes a computer to behave in an unexpected and
undesirable manner
Spread to other machines when a computer user shares an
infected file or sends an email with a virus-infected attachment
Worms
A harmful program that resides in the active memory of the
computer and duplicates itself
Can propagate without human intervention
15 Types of Exploits
Trojan Horses
A seemingly harmless program in which malicious code is hidden
A victim on the receiving end is usually tricked into opening it
because it appears to be useful software from a legitimate source
The program’s harmful payload might be designed to enable the
attacker to destroy hard drives, corrupt files, control the
computer remotely, launch attacks against other computers,
steal passwords or spy on users
Often creates a “backdoor” on a computer that enables an
attacker to gain future access
Logic bomb
A type of Trojan horse that executes when it is triggered by a
specific event
16 Types of Exploits
Blended Threat
A sophisticated threat that combines the features of a virus,
worm, Trojan horse, and other malicious code into a single
payload
Might use server and Internet vulnerabilities to initiate and then
transmit and spread an attack using EXE files, HTML files, and
registry keys
Spam
The use of email systems to send unsolicited email to large
Spam
The use of email systems to send unsolicited email to large
numbers of people
Also an inexpensive method of marketing used by many
legitimate organizations
Controlling the Assault of Non-Solicited Pornography and
Marketing (CAN-SPAM) Act states that it is legal to spam,
provided the messages meet a few basic requirements
Spammers cannot disguise their identity by using a false return
address
The email must include a label specifying that it is an ad or a
solicitation
The email must include a way for recipients to opt out of future
mass mailings
17 Types of Exploits
Spam (cont’d)
CAPTCHA (Completely Automated Public Turing Test to Tell
Computers and Humans Apart) software generates and grades
tests that humans can pass and all but the most sophisticated
computer programs cannot
18 Types of Exploits
Distributed Denial-of-Service Attacks
An attack in which a malicious hacker takes over computers via
the Internet and causes them to flood a target site with demands
for data and other small tasks
Keeps target so busy responding to requests that legitimate users
cannot get in
Botnet
A large group of computers, controlled from one or more remote
locations by hackers, without the consent of their owners
Sometimes called zombies
Frequently used to distribute spam and malicious code
19 Types of Exploits
20 Types of Exploits
Rootkit
A set of programs that enables its user to gain administrator-level
access to a computer without the end user’s consent or
knowledge
Attackers can use the rootkit to execute files, access logs,
monitor user activity, and change the computer’s configuration
21
20
Cicero
28
27
Cicero
28 Information Security and The Law
Most countries have a legal framework that supports some level of
information security, especially in the developed world.
However, it is not wise to rely on the law or the State to secure
information resources.
Laws don’t prevent the bad guys from doing bad things, and the
State typically becomes involved only after a crime has been
committed.
Laws are only effective if they are enforced.
The Roman statesman and philosopher Cicero once said, “The
more laws, the less justice”.
Companies take responsibility for their own information security.
Likewise, individuals should take responsibility for their own
information security.
29 Federal Laws for Prosecuting Computer Attacks
30 Risk
“It's a dangerous business, Frodo, going out your door.”
J. R. R. Tolkien
31 Risk: good or bad?
Risk is not only ever-present, but also necessary for successful
business.
Since, by definition, something that is risk-free is guaranteed to be
successful, a strong argument may be made that anything worth
doing, must be risky.
If value is related to scarcity, then risk also contributes to value.
If something is not risky, then there will be an abundance of it, and
it will not have much value.
If something is risky, it will be scarce, and therefore, valuable.
Risk cannot be eliminated.
Since risk contributes to value, it should be managed, like any other
resource that contributes to value.
An argument may also be made that risk and value are
complementary aspects of the same thing.
35
Determine how each threat can be mitigated so it is less likely to
occur
Assess the feasibility of implementing the mitigation options
Perform a cost-benefit analysis to ensure that your efforts will be
cost effective
Make the decision on whether or not to implement a particular
countermeasure
35 Risk Assessment
36 Information Security Governance and Policy
37 Establishing a Security Policy
Security policy has three elements.
Enterprise Information Security Policy (EISP): A general statement
of organisation's security programme. This statement becomes the
foundation for more specific security measures.
Management specifies the goals of security programme and the
assets to be protected.
Statement designates a department for managing security
programme and documents. In general terms, it specifies how the
organisation will ensure enforcement of security programmes and
policies.
Issue-Specific Security Policy (ISSP): e.g. Personal use of
computers at work and email privacy.
System-Specific Security Policy (SSSP): e.g. what customer data
from order-entry system will be sold or shared with other
organisations? Or, what policies govern the design and operation
of systems that process employee data? Addressing such policies
is part of standard systems development process.
38 Security Education, Training, and Awareness Program (SETA)
Once general security policy exists, implement a security
education, training, and awareness (SETA) program
SETA is a control measure designed to reduce accidental security
breaches.
The SETA program consists of security education, security training,
and security awareness.
Enhances security by improving awareness, developing skills, and
knowledge, and building in-depth knowledge
39 Security Education
Everyone in an organization needs to be trained and aware of
information security; not every member needs a formal degree or
certificate in information security.
When formal education is deemed appropriate, an employee can
40
39
45
A hardware- or software-based network security system that is
able to detect and block sophisticated attacks by filtering network
traffic dependent on the packet contents
Goes deeper to inspect the payload of packets and match
sequences of bytes for harmful activities
45 Utilizing a Security Dashboard
Security dashboard software provides a comprehensive display of
all vital data related to an organization’s security defenses
46 Installing Antivirus Software on Personal Computers
Antivirus software
Scans for specific sequence of bytes, known as a virus signature,
that indicates the presence of a specific virus
If virus is found
Antivirus software informs the user and may clean, delete, or
quarantine any files, directories, or disks affected by the malicious
code
It is crucial that antivirus software be continually updated with the
latest virus signatures
47 Implementing Safeguards against Attacks by Malicious Insiders
User accounts that remain active after employees leave a company
are a potential security risk
IS staff must promptly delete computer accounts, login IDs, and
passwords of departing employees
Another safeguard
Create roles and user accounts so that users have the authority
to perform their responsibilities and nothing more
48 Addressing the Most Critical Internet Security Threats
Computer attackers
Know that many organizations are slow to fix problems
Scan the Internet for vulnerable systems
US-CERT regularly updates a summary of the most frequent, high-
impact vulnerabilities being reported
Find it at www.us-cert.gov/current
Actions required to address these issues include installing a known
patch to the software
And keeping applications and OSs up-to-date
49 Conducting Periodic IT Security Audits
Security audit
Evaluates whether an organization has well-considered security
policy in place and if it is being followed
49
Questions to cover:
Within the company, who needs to be notified, and what
information does each person need to have?
Under what conditions should the company contact major
customers and suppliers?
How does the company inform them of a disruption in business
without unnecessarily alarming them?
When should local authorities or the FBI be contacted?
A critical ethical question:
What to tell customers and others whose personal data may have
been compromised?
54 Protection of Evidence and Activity Logs
Organizations should document all details of a security incident as
it works to resolve the incident
Documentation captures valuable evidence for a future prosecution
And provides data to help during the incident eradication and
follow-up phases
Organizations should establish a set of document-handling
procedures using the legal department as a resource
55 Incident Containment
The incident response plan should clearly define the process for
deciding if an attack is dangerous enough to warrant shutting down
or disconnecting critical systems from the network
Elements of an effective response plan:
How decisions for shutting down systems is made
How fast those decisions are made
Who makes them
56 Eradication
Before eradication, the IT security group must:
Collect and log all possible criminal evidence from the system
Verify that all necessary backups are current, complete, and free
of any malware
Create a forensic disk image of each compromised system
After eradication, a new backup must be created
A log should be kept of all actions taken
All backups should be created with enough frequency to enable a
full and quick restoration of data
If an attack destroys the original
57
57 Incident Follow-Up
Follow-up should include:
Determining how the organization’s security was compromised
A review to determine exactly what happened and to evaluate
how the organization responded
A detailed chronology of all events
An estimate of the monetary damage
A decision on how much effort should be put into capturing the
perpetrator
A decision on whether it has an ethical or a legal duty to inform
customers or clients of a cyber attack
58 Using a Managed Security Service Provider (MSSP)
Managed Security Service Provider (MSSP)
A company that monitors, manages, and maintains computer and
network security for other organizations
Includes companies such as AT&T, Computer Sciences
Corporation, Dell SecureWorks, IBM, Symantec, and Verizon
Some MSSPs provide vulnerability scanning and Web blocking and
filtering capabilities
59 Computer Forensics
Computer Forensics
A discipline that combines elements of law and computer science
to identify, collect, examine, and preserve data from computer
systems, networks, and storage devices in a manner that
preserves the integrity of the data gathered
Computer forensics investigators work as a team to investigate an
incident and conduct the forensic analysis
Proper handling of computer forensics investigation is the key to
fighting computer crime successfully in a court of law
Numerous certifications exist:
CCE (Certified Computer Examiner), CISSP (Certified Information
Systems Security Professional), CSFA (CyberSecurity Forensic
Analyst), and GCFA (Global Information Assurance Certification
Certified Forensic Analyst)
60 Computer Forensics
61 Computer Forensics
62 Summary
Computer crime is a serious and rapidly growing area of concern
requiring management attention
Computer crime is a serious and rapidly growing area of concern
requiring management attention
Organizations must take strong measures to ensure secure,
private, and reliable computing experiences for their employees,
customers, and business partners